{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:24:10Z","timestamp":1759091050646},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11390-019-1961-5","type":"journal-article","created":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T07:03:49Z","timestamp":1570086229000},"page":"1079-1095","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks"],"prefix":"10.1007","volume":"34","author":[{"given":"Chi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jun-Rong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Da-Wu","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Wei-Jia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiang-Jun","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Hai-Ning","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,6]]},"reference":[{"key":"1961_CR1","unstructured":"Shankar P M. Introduction to Wireless Systems. Wiley, 2002."},{"key":"1961_CR2","doi-asserted-by":"crossref","unstructured":"Sauter M. From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband (1st edition). Wiley, 2011.","DOI":"10.1002\/9780470978238"},{"key":"1961_CR3","doi-asserted-by":"crossref","unstructured":"Bertoni G, Daemen J, Peeters M, van Assche G. Keccak. In  Proc. the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2013, pp.313-314.","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"1961_CR4","doi-asserted-by":"crossref","unstructured":"Steele R, Lee C C, Gould P. GSM, cdmaOne and 3G Systems (1st edition). Wiley, 2001.","DOI":"10.1002\/0470841672"},{"key":"1961_CR5","unstructured":"Mangard S, Oswald E, Popp T. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, 2007."},{"key":"1961_CR6","unstructured":"Rao J R, Rohatgi P, Scherzer H, Tinguely S. Partitioning attacks: Or how to rapidly clone some GSM cards. In Proc. the 2002 IEEE Symposium on Security and Privacy, May 2002, pp. 31-41."},{"key":"1961_CR7","doi-asserted-by":"crossref","unstructured":"Zhou Y, Yu Y, Standaert F X, Quisquater J J. On the need of physical security for small embedded devices: A case study with COMP128-1 implementations in SIM cards. In Proc. the 17th International Conference on Financial Cryptography and Data Security, April 2013, pp.230-238.","DOI":"10.1007\/978-3-642-39884-1_20"},{"key":"1961_CR8","doi-asserted-by":"crossref","unstructured":"Liu J, Yu Y, Standaert F X, Guo Z, Gu D, Sun W, Ge Y, Xie X. Small tweaks do not help: Differential power analysis of MILENAGE implementations in 3G\/4G USIM cards. In Proc. the 20th European Symposium on Research in Computer Security, September 2015, pp.468-480.","DOI":"10.1007\/978-3-319-24174-6_24"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-019-1961-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-019-1961-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-019-1961-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T23:45:18Z","timestamp":1599263118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-019-1961-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":8,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["1961"],"URL":"https:\/\/doi.org\/10.1007\/s11390-019-1961-5","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9]]},"assertion":[{"value":"25 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}